271 lines
13 KiB
HTML
271 lines
13 KiB
HTML
<?xml version="1.0" encoding="utf-8"?>
|
|
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
|
|
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
|
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-us">
|
|
<head>
|
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
|
<meta name="dc.language" scheme="rfc1766" content="en-us" />
|
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
|
<!-- US Government Users Restricted Rights -->
|
|
<!-- Use, duplication or disclosure restricted by -->
|
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
|
<meta name="dc.date" scheme="iso8601" content="2005-09-06" />
|
|
<meta name="copyright" content="(C) Copyright IBM Corporation 1997, 2006" />
|
|
<meta name="security" content="public" />
|
|
<meta name="Robots" content="index,follow"/>
|
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
|
<meta name="owner" content="RCHCLERK@us.ibm.com" />
|
|
<title>K</title>
|
|
<link rel="stylesheet" type="text/css" href="ibmidwb.css" />
|
|
<link rel="stylesheet" type="text/css" href="ic.css" />
|
|
</head>
|
|
<body>
|
|
<a id="Top_Of_Page" name="Top_Of_Page"></a><!-- Java sync-link -->
|
|
<script language = "Javascript" src = "../rzahg/synch.js" type="text/javascript"></script>
|
|
|
|
|
|
<a name="k"></a>
|
|
<h2 id="k">K</h2>
|
|
<p>Return to <a href="as4glos.htm#as4glos">Glossary</a>.</p>
|
|
<dl>
|
|
<dt id="x2057628" class="bold">
|
|
<a name="x2057628"></a>Kanji</dt>
|
|
<dd>A graphic character set consisting
|
|
of symbols used in Japanese ideographic alphabets. Each character is represented
|
|
by 2 bytes.</dd>
|
|
<dt id="x2057633" class="bold">
|
|
<a name="x2057633"></a>Katakana</dt>
|
|
<dd>A Japanese phonetic syllabary
|
|
used primarily for foreign names and place names and words of foreign origin.
|
|
The symbols are angular, while those of Hiragana are cursive. Katakana is
|
|
written left to right, or top to bottom. See also <a href="rzaatk.htm#x2057628">Kanji</a>.</dd>
|
|
<dt id="x2210106" class="bold">
|
|
<a name="x2210106"></a>KDC</dt>
|
|
<dd>See <a href="rzaatk.htm#x2028006">key
|
|
distribution center</a>.</dd>
|
|
<dt id="x2027948" class="bold">
|
|
<a name="x2027948"></a>keep-alive</dt>
|
|
<dd>Pertaining to the amount
|
|
of time that elapses before a message is sent to verify a connection.</dd>
|
|
<dt id="x2027953" class="bold">
|
|
<a name="x2027953"></a>Kerberos</dt>
|
|
<dd>The security system of Massachusetts
|
|
Institute of Technology's (MIT) Project Athena. It uses symmetric key cryptography
|
|
to provide security services to users in a network.</dd>
|
|
<dt id="x2027958" class="bold">
|
|
<a name="x2027958"></a>kernel</dt>
|
|
<dd>In OSI, a session-layer functional
|
|
unit that supports the basic session services required to establish connections,
|
|
transfer normal data, and release connections.</dd>
|
|
<dt id="x2027963" class="bold">
|
|
<a name="x2027963"></a>kernel thread</dt>
|
|
<dd>A one-to-one mapping
|
|
between program threads and process threads where each thread is assigned
|
|
to a machine task.</dd>
|
|
<dt id="x2002682" class="bold">
|
|
<a name="x2002682"></a>key</dt>
|
|
<dd>(1) A field used to search for a
|
|
database segment or a record, or to sort a set of records.</dd>
|
|
<dd>(2) A column
|
|
or an ordered collection of columns that is identified in the description
|
|
of a table, index, or referential constraint. The same column can be part
|
|
of more than one key.</dd>
|
|
<dd>(3) In computer security, a sequence of symbols
|
|
that is used with a cryptographic algorithm for encrypting or decrypting
|
|
data. See also <a href="rzaatp.htm#x2034701">private key</a>, <a href="rzaatp.htm#x2035427">public key</a>.</dd>
|
|
<dt id="x2027986" class="bold">
|
|
<a name="x2027986"></a>keyboard profile</dt>
|
|
<dd>In iSeries™ Access, a
|
|
file that defines the way characters and functions are mapped to keys on the
|
|
keyboard when the personal computer is emulating a host session.</dd>
|
|
<dt id="x2027991" class="bold">
|
|
<a name="x2027991"></a>keyboard shift</dt>
|
|
<dd>In DDS, a characteristic
|
|
that can be specified for a field in a display file that automatically shifts
|
|
the display station keyboard to control what the display station user can
|
|
enter into the field. In IDDU and DDS, the keyboard shift can also be specified
|
|
in database files, but only applies when these fields are referred to in a
|
|
display file.</dd>
|
|
<dt id="x2186192" class="bold">
|
|
<a name="x2186192"></a>keyboard shortcut</dt>
|
|
<dd>A key or combination
|
|
of keys that a user can press to perform an action that is available from
|
|
a menu.</dd>
|
|
<dt id="x2027996" class="bold">
|
|
<a name="x2027996"></a>keyboard style</dt>
|
|
<dd>In iSeries Access, the
|
|
keyboard key assignments that are changed to match a particular keyboard type
|
|
or user-defined arrangement.</dd>
|
|
<dt id="x2028001" class="bold">
|
|
<a name="x2028001"></a>keyboard type</dt>
|
|
<dd>The physical key arrangement
|
|
and assignments for the keyboard shipped from the factory.</dd>
|
|
<dt id="x2028006" class="bold">
|
|
<a name="x2028006"></a>key distribution center (KDC)</dt>
|
|
<dd>(1) A network
|
|
service that provides tickets and temporary session keys. The KDC maintains
|
|
a database of principals (users and services) and their associated secret
|
|
keys. It is composed of the authentication server and the ticket granting
|
|
ticket server. It is important to use a secure machine to act as the KDC.
|
|
Otherwise, the entire realm could be compromised.</dd>
|
|
<dd>(2) In the Kerberos
|
|
protocol, the central server, which includes both the authentication server
|
|
and the ticket-granting server. The KDC is sometimes referred to as the Kerberos
|
|
server.</dd>
|
|
<dt id="x2028011" class="bold">
|
|
<a name="x2028011"></a>keyed compliance</dt>
|
|
<dd>A requirement whereby
|
|
the user must have a license key (code) from the software provider to be able
|
|
to change the usage limit or the expiration date of the license information.</dd>
|
|
<dt id="x2028016" class="bold">
|
|
<a name="x2028016"></a>keyed data queue</dt>
|
|
<dd>An i5/OS™ data queue
|
|
that contains individual pieces of data (messages) that are associated with
|
|
a key value. Messages can be received from a keyed data queue by specifying
|
|
the key value or a relational operator. The system-recognized identifier for
|
|
the object type is *DTAQ.</dd>
|
|
<dt id="x2028021" class="bold">
|
|
<a name="x2028021"></a>keyed sequence</dt>
|
|
<dd>An order in which
|
|
records are retrieved that is based on the contents of key fields in records.
|
|
See also <a href="rzaata.htm#x2014083">arrival sequence</a>.</dd>
|
|
<dt id="x2028026" class="bold">
|
|
<a name="x2028026"></a>keyed sequence access path</dt>
|
|
<dd>An access
|
|
path to a database file that is arranged according to the contents of key
|
|
fields contained in the individual records.</dd>
|
|
<dt id="x2028031" class="bold">
|
|
<a name="x2028031"></a>key-encrypting key</dt>
|
|
<dd>In Cryptographic
|
|
Support, a key used to encrypt another cryptographic key.</dd>
|
|
<dt id="x2028036" class="bold">
|
|
<a name="x2028036"></a>key entry area</dt>
|
|
<dd>In AFP™ Utilities, an
|
|
area shown at the lower part of the image area for entering the parameters
|
|
for an element.</dd>
|
|
<dt id="x2028041" class="bold">
|
|
<a name="x2028041"></a>key field</dt>
|
|
<dd>A field used to arrange
|
|
the records of a particular type within a file member.</dd>
|
|
<dt id="x2028046" class="bold">
|
|
<a name="x2028046"></a>key field level specification</dt>
|
|
<dd>Data
|
|
description specification coded on the lines following the last field specification.
|
|
Key field level specifications are permitted only for physical files or logical
|
|
files.</dd>
|
|
<dt id="x2086352" class="bold">
|
|
<a name="x2086352"></a>keylock feature</dt>
|
|
<dd>A security feature
|
|
in which a lock and key can be used to restrict the use of the display station.</dd>
|
|
<dt id="x2028061" class="bold">
|
|
<a name="x2028061"></a>keylock switch</dt>
|
|
<dd>A switch on the control
|
|
panel that can be set to one of four different positions to establish the
|
|
power-on and power-off modes allowed for the system.</dd>
|
|
<dt id="x2028071" class="bold">
|
|
<a name="x2028071"></a>key of reference</dt>
|
|
<dd>In COBOL, the key,
|
|
either prime or alternate, currently being used to access records within an
|
|
indexed file.</dd>
|
|
<dt id="x2028076" class="bold">
|
|
<a name="x2028076"></a>key pair</dt>
|
|
<dd>In computer security, a
|
|
public key and a private key. The sender uses the private key to encrypt the
|
|
message. The recipient uses the public key to decrypt the message. Because
|
|
the private key holds more of the encryption pattern than the public key does,
|
|
the key pair is called asymmetric.</dd>
|
|
<dt id="x2028081" class="bold">
|
|
<a name="x2028081"></a>key policy</dt>
|
|
<dd>A single, key-protection
|
|
transform that the initiating key server offers to the responding key server.
|
|
A key policy governs Phase I negotiations.</dd>
|
|
<dt id="x2028086" class="bold">
|
|
<a name="x2028086"></a>key ring</dt>
|
|
<dd>In computer security, a
|
|
file that contains public keys, private keys, trusted roots, and certificates.</dd>
|
|
<dt id="x2028091" class="bold">
|
|
<a name="x2028091"></a>key schedule</dt>
|
|
<dd>In Cryptographic Support,
|
|
sixteen 8-byte keys created by the Data Encryption Algorithm from the supplied
|
|
cryptographic key that are used to encrypt or decrypt the supplied data.</dd>
|
|
<dt id="x2028096" class="bold">
|
|
<a name="x2028096"></a>key server</dt>
|
|
<dd>A server that negotiates
|
|
the values that determine the characteristics of a dynamic virtual private
|
|
network (VPN) connection that is established between two endpoints.</dd>
|
|
<dt id="x2028101" class="bold">
|
|
<a name="x2028101"></a>key system</dt>
|
|
<dd>In telephony, the type
|
|
of telephone system that provides telephones with more than one line for users.
|
|
Outside lines appear directly on the telephones instead of being routed through
|
|
an operator and transferred, as in PBX systems.</dd>
|
|
<dt id="x2028106" class="bold">
|
|
<a name="x2028106"></a>key table</dt>
|
|
<dd>(1) A file on the service's
|
|
host system. Each entry in the file contains the service principal's name
|
|
and secret key. On i5/OS, a key table file is created during configuration
|
|
of network authentication service. When a service requests authentication
|
|
to i5/OS with Network Authentication Service configured, that i5/OS checks the
|
|
key table file for that service's credentials. To ensure that users and services
|
|
are authenticated properly, you must have users and services enrolled on the
|
|
KDC and on i5/OS.</dd>
|
|
<dd>(2) In the Kerberos protocol, a file that contains service
|
|
principal names and secret keys. The secret keys should be known only to the
|
|
services that use the key table file and to the key distribution center (KDC).</dd>
|
|
<dt id="x2028113" class="bold">
|
|
<a name="x2028113"></a>key/think time</dt>
|
|
<dd>In capacity planning,
|
|
the time between interactive transactions such as typing, thinking, idle time,
|
|
and so on. As an interactive user's proficiency with the application improves,
|
|
the user's key/think time is likely to reduce, which can result in an increase
|
|
in the observed throughput.</dd>
|
|
<dt id="x2028118" class="bold">
|
|
<a name="x2028118"></a>key translation</dt>
|
|
<dd>In Cryptographic
|
|
Support, the conversion of a data encrypting key from encryption under a previous
|
|
key-encrypting key to encryption under another key-encrypting key.</dd>
|
|
<dt id="x2002697" class="bold">
|
|
<a name="x2002697"></a>keyword</dt>
|
|
<dd>(1) One of the predefined words
|
|
of a programming language, artificial language, application, or command.</dd>
|
|
<dd>(2) A name that identifies an option used in an SQL statement.</dd>
|
|
<dt id="x2028141" class="bold">
|
|
<a name="x2028141"></a>keyword functions</dt>
|
|
<dd>The result of processing
|
|
DDS keywords in a record format specified on an operation.</dd>
|
|
<dt id="x2028146" class="bold">
|
|
<a name="x2028146"></a>keyword instruction</dt>
|
|
<dd>In REXX, one
|
|
or more clauses, the first of which starts with a keyword that identifies
|
|
the instruction. Some keyword instructions affect the flow of control, while
|
|
others provide services to the programmer. CALL, DO, and PARSE are examples
|
|
of keyword instructions.</dd>
|
|
<dt id="x2045026" class="bold">
|
|
<a name="x2045026"></a>Kilovolt ampere (kVA)</dt>
|
|
<dd>A unit of power.</dd>
|
|
<dt id="x2028151" class="bold">
|
|
<a name="x2028151"></a>Korean double-byte character set</dt>
|
|
<dd>An IBM-defined double-byte character set for Korean, consisting of Korean
|
|
non-Hangeul/non-Hanja set, Hangeul set, Hanja set and up to 1,880 user-definable
|
|
characters.</dd>
|
|
<dt id="x2028156" class="bold">
|
|
<a name="x2028156"></a>Korean Hangeul character set</dt>
|
|
<dd>A subset
|
|
of the Korean DBCS, consisting of 2672 Hangeul characters and 52 Jamo characters.</dd>
|
|
<dt id="x2028161" class="bold">
|
|
<a name="x2028161"></a>Korean Hanja character set</dt>
|
|
<dd>A subset
|
|
of the Korean DBCS, consisting of 5265 Hanja characters.</dd>
|
|
<dt id="x2028166" class="bold">
|
|
<a name="x2028166"></a>Korean non-Hangeul/non-Hanja character set</dt>
|
|
<dd>A subset of the Korean DBCS, consisting of non-Hangeul/non-Hanja characters,
|
|
such as Greek, Russian, Roman numeric, alphanumeric and related symbols, Katakana,
|
|
Hiragana, and special symbols. There are 940 characters in this set.</dd>
|
|
<dt id="x2395101" class="bold">
|
|
<a name="x2395101"></a>kVA</dt>
|
|
<dd>See <a href="rzaatk.htm#x2045026">Kilovolt
|
|
ampere</a>.</dd></dl>
|
|
<a id="Bot_Of_Page" name="Bot_Of_Page"></a>
|
|
</body>
|
|
</html>
|